RST Cloud - Threat Feed API
RST Threat Feed Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
This is the RST Threat Feed integration for interacting with API This integration was integrated and tested with RST Cloud - Threat Feed API v1
Please contact the RST Cloud team via email support@rstcloud.net to obtain a key and ask any questions you have. Also, the following contact details can be used:
Each indicator is ranked from 0 to 100. Indicators are being collected from multiple sources and are cross-verified using multiple criteria. Please check indicator tags and malware family fields. An indicator may describe a known malware or a scanning host. Therefore, different actions may be required based on the context.
#
Configure RST Cloud - Threat Feed API on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for RST Cloud - Threat Feed API.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL (e.g. https://api.rstcloud.net/v1) True API Key True Score threshold for IP reputation command Set this to determine the RST Threat Feed score that will determine if an IP is malicious (0-100) True Score threshold for domain reputation command Set this to determine the RST Threat Feed score that will determine if a domain is malicious (0-100) True Score threshold for url reputation command Set this to determine the RST Threat Feed score that will determine if a url is malicious (0-100) True Score threshold for file reputation command Set this to determine the RST Threat Feed score that will determine if a file is malicious (0-100) True IP Indicator Expiration (days) Mark IP indicators older than indicator_expiration_ip value in days as Suspicious ignoring the last available score True Domain Indicator Expiration (days) Mark domain indicators older than indicator_expiration_domain value in days as Suspicious ignoring the last available score True URL Indicator Expiration (days) Mark URL indicators older than indicator_expiration_url value in days as Suspicious ignoring the last available score True Hash Indicator Expiration (days) Mark Hash indicators older than indicator_expiration_url value in days as Suspicious ignoring the last available score True Use system proxy settings False Trust any certificate (not secure) False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipReturns IP information and reputation.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | List of IPs. | Required |
threshold | If the IP has reputation above the threshold then the IP defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 45. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
IP.Address | String | IP address. |
IP.Geo.Country | String | Country of origin. |
IP.Tags | String | The associated tags. |
IP.Malicious.Vendor | String | The vendor reporting the IP address as malicious. |
IP.Malicious.Description | String | A description explaining why the IP address was reported as malicious. |
IP.Malicious.Score | String | The score calculated for the indicator by the vendor. |
RST.IP.Address | String | The actual IP address. |
RST.IP.Geo.Country | String | The country name. |
RST.IP.Geo.Region | String | The geo region name. |
RST.IP.Geo.City | String | The city name. |
RST.IP.ASN | String | The autonomous system name for the IP address. |
RST.IP.Organization | String | The organisation name for the autonomous system name for the IP address. |
RST.IP.ISP | String | The Internet Service Provider name for the autonomous system name for the IP address. |
RST.IP.CloudHosting | String | The Cloud Provider name for the IP address. |
RST.IP.NumberOfDomainInASN | String | The number of domain names for the IP address. |
RST.IP.FirstSeen | Date | First Seen. |
RST.IP.LastSeen | Date | Last Seen. |
RST.IP.Tags | String | The associated tags. |
RST.IP.Threat | String | The associated Malware Family or threat name. |
RST.IP.Score | Number | The total score. |
RST.IP.UUID | String | The unique ID for the indicator. |
RST.IP.RSTReference | String | The link to the raw JSON indicator. |
RST.IP.Related | String | The associated domains. |
RST.IP.FalsePositive | String | true if it is likely a False Positive. |
RST.IP.FalsePositiveDesc | String | Description why we think it may be a False Positive. |
RST.IP.CVE | String | Related CVE (vulnerabilities) |
RST.IP.Industry | String | Related Industry. |
RST.IP.Report | String | Collected from. |
#
Command Example!ip ip=1.2.3.4 threshold=50
#
Context Example#
Human Readable Output#
RST Threat Feed IP Reputation for: 1.2.3.4
Description Last Seen Relevance Score Tags Threat Ioc with tags: c2, generic. related threats: emotet 2021-01-26 Suspicious 3 c2, generic emotet
#
domainReturns Domain information and reputation.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | List of Domains. | Required |
threshold | If the domain has reputation above the threshold then the domain defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 45. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
Domain.Name | String | The domain name. |
Domain.Tags | String | The associated tags |
Domain.Malicious.Vendor | String | The vendor reporting the domain as malicious. |
Domain.Malicious.Description | String | A description explaining why the domain was reported as malicious. |
Domain.Malicious.Score | String | The score calculated for the indicator by the vendor. |
RST.Domain.Name | String | The domain name. |
RST.Domain.WhoisAge | Number | Days since creation. |
RST.Domain.WhoisDomainCreationDate | Date | Creation date. Format is ISO8601. |
RST.Domain.WhoisDomainUpdateDate | Date | Update date. Format is ISO8601. |
RST.Domain.WhoisDomainExpireDate | Date | Expiration date. Format is ISO8601. |
RST.Domain.WhoisRegistrar | String | Domain Registrar. |
RST.Domain.WhoisRegistrant | String | Domain Registrant. |
RST.Domain.FirstSeen | Date | First Seen. |
RST.Domain.LastSeen | Date | Last Seen. |
RST.Domain.Tags | String | The associated tags. |
RST.Domain.Threat | String | The associated Malware Family or threat name. |
RST.Domain.Score | Number | The total score. |
RST.Domain.UUID | String | The unique ID for the indicator. |
RST.Domain.RSTReference | String | The link to the raw JSON indicator. |
RST.Domain.Related | String | The associated IP addresses. |
RST.Domain.FalsePositive | String | true if it is likely a False Positive. |
RST.Domain.FalsePositiveDesc | String | Description why we think it may be a False Positive. |
RST.Domain.CVE | String | Related CVE (vulnerabilities) |
RST.Domain.Industry | String | Related Industry. |
RST.Domain.Report | String | Collected from. |
#
Command Example!domain domain="domaintovalidate.local" threshold=40
#
Context Example#
Human Readable Output#
RST Threat Feed Domain Reputation for: domaintovalidate.local
Description Last Seen Relevance: Score Tags Ioc with tags: malware 2021-01-25 Suspicious 10 malware
#
urlReturns URL information and reputation.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | List of URLs. | Required |
threshold | If the URL has reputation above the threshold then the URL defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 30. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
URL.Data | String | The URL. |
URL.Tags | String | The associated tags. |
URL.Malicious.Vendor | String | The vendor reporting the URL as malicious. |
URL.Malicious.Description | String | A description explaining why the URL was reported as malicious. |
URL.Malicious.Score | String | The score calculated for the URL indicator by the vendor. |
RST.URL.Data | String | The URL. |
RST.URL.Status | String | Last HTTP status code. |
RST.URL.FirstSeen | Date | First Seen. |
RST.URL.LastSeen | Date | Last Seen. |
RST.URL.Tags | String | The associated tags. |
RST.URL.Threat | String | The associated Malware Family or threat name. |
RST.URL.Score | Number | The total score. |
RST.URL.UUID | String | The unique ID for the indicator |
RST.URL.Description | String | The associated Description provided by the vendor. |
RST.URL.FalsePositive | String | true if it is likely a False Positive. |
RST.URL.FalsePositiveDesc | String | Description why we think it may be a False Positive. |
RST.URL.Parsed | String | Parsed URL components. |
RST.URL.CVE | String | Related CVE (vulnerabilities) |
RST.URL.Industry | String | Related Industry. |
RST.URL.Report | String | Collected from. |
#
Command Example!url url="https://domain.local/testurl" threshold=30
#
Context Example#
Human Readable OutputRST Threat Feed URL Reputation for:
https://domain.local/testurl
#
Description Last Seen Relevance Score Tags Threat Ioc with tags: malware. related threats: emotet 2021-01-26 Suspicious 14 malware emotet
#
fileReturns File information and reputation.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | List of Files. | Required |
threshold | If the File has reputation above the threshold then the File defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 5. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
File.Name | String | The file name. |
File.MD5 | String | MD5 for the the file name. |
File.SHA1 | String | SHA1 for the the file name. |
File.SHA256 | String | The URL. |
File.Tags | String | The associated tags. |
File.Malicious.Vendor | String | The vendor reporting the File as malicious. |
File.Malicious.Description | String | A description explaining why the File was reported as malicious. |
File.Malicious.Score | String | The score calculated for the File indicator by the vendor. |
RST.File.Name | String | The file name. |
RST.File.MD5 | String | MD5 for the the file name. |
RST.File.SHA1 | String | SHA1 for the the file name. |
RST.File.SHA256 | String | SHA256 for the the file name. |
RST.File.FirstSeen | Date | First Seen. |
RST.File.LastSeen | Date | Last Seen. |
RST.File.Tags | String | The associated tags. |
RST.File.Threat | String | The associated Malware Family or threat name. |
RST.File.Score | Number | The total score. |
RST.File.UUID | String | The unique ID for the indicator. |
RST.File.Description | String | The associated Description provided by the vendor. |
RST.File.FalsePositive | String | true if it is likely a False Positive. |
RST.File.FalsePositiveDesc | String | Description why we think it may be a False Positive. |
RST.File.CVE | String | Related CVE (vulnerabilities) |
RST.File.Industry | String | Related Industry. |
RST.File.Report | String | Collected from. |
#
Command Example!file file="fe3d38316dc38a4ec63eac80e34cb157c9d896460f9b7b3bfbd2cec4e2cb8cdc"threshold=5
#
Context Example#
Human Readable OutputRST Threat Feed File Reputation for:
https://domain.local/testurl
#
Description Last Seen Relevance Score Tags Threat Ioc with tags: malware. related threats: emotet 2021-01-26 Suspicious 14 malware emotet
#
rst-submit-newSubmits an indicator to RST Threat Feed.
#
Base Commandrst-submit-new
#
InputArgument Name | Description | Required |
---|---|---|
ioc | List of IOCs (URLs, domains or IPs). | Required |
description | Any context to pass to RST Cloud. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!rst-submit-new ioc="thisisamaliciouswebsite.com" description="a user downloaded a trojan"
#
Human Readable OutputIndicator: thisisamaliciouswebsite.com was submitted as a potential threat indicator to RST Cloud
#
rst-submit-fpSubmits a potential False Positive to RST Threat Feed.
#
Base Commandrst-submit-fp
#
InputArgument Name | Description | Required |
---|---|---|
ioc | List of IOCs (URLs, domains or IPs). | Required |
description | Any context to pass to RST Cloud. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!rst-submit-fp ioc="thisisnotamaliciousdomain.com" description="a decent website"
#
Human Readable OutputIndicator: thisisnotamaliciousdomain.com was submitted as False Positive to RST Cloud